Who is the ChiefHomeOfficer?

YOU are - or anyone who works from home. Whether you're a full-time 1099er, a corporate teleworking W-2er, a part-time eBayer, or any head-of-household handling family, finances and affairs from a corner desk - and in search of a little balance in the home office, then ChiefHomeOfficer's your destination.
Think of Chief Home Officer.com as LifeHacker meets the home office - no matter what home office you run. Entrepreneurs will discover SOHO 2.0 business insight. Teleworkers will learn leading-edge remote work strategies. will spot tips, tales and links on balance. And those considering making the leap into home officing will unearth equal parts reality and validation. Explore. Learn. Return.

The SOHO Sherpa…

ChiefHomeOfficer is your SOHO Sherpa - a guide to all the things that make the Small Or Home Office (SOHO) work. Since 1993, we've chronicled the work-at-home adventure. Today, the site offers honest and occasionally humorous insights, tips, tech/product reviews, and commentary that cut through the "Make Millions From Home" promise and just lay down the real skinny on a lifestyle people can work and live with.

Want to learn more? If you work from home, want to, or are a corporate marketer hoping to talk to those who do, email jeff [at] chiefhomeofficer dot com or dial 954-346-4393.

Meta

Cloud computing providers are catching on to two-step authentication. Those who’ve used GMail for several years have had the option of using “multi-factor” verification. With this free process, when you log on from an unfamiliar computer (or one more vulnerable to access than your home-office desktop), the provider can send a code via text to your cell phone.

Long a security feature for GMail users (no surprise there), it’s now available to Dropbox users and those with an Apple ID. It’s good news, given word that an Apple ID security flaw was revealed recently.

With the opt-in service, after you enter your user ID and password, the cloud service will ask for the additional verification code. Check your phone, type in the code, and you’re in. It’s ideal for teleworkers and road warriors who could find their laptops or tablets susceptible to theft. If the computer had the log-in credentials, a thief could access their accounts. With two-step, unless the thief also gets the cell phone, the account generally is safe.

The premise is that someone trying to hack your cloud account likely won’t have access to your phone.

Some believe two-step authentication is a nuisance. The only time it’s been so to this writer is when I tried to log into Gmail (and Google Drive) while flying. Sadly, my wireless carrier didn’t provide service at 30,000 feet. Hence, the verification code was waiting for me when I landed.

Too late.

But the real nuisance – which hasn’t yet happened (hear wood being knocked?) – comes to those email or cloud users who get hacked with simple single-step authentication. That is, they use a user ID and password. While it’s not infallible, two-step can be a vital protective measure.

To simplicity’s sake, I only use two-step authentication for my laptop and portable devices. I don’t require it on my desktop (if someone were to break into my home and steal my desktop, I think I’d have bigger issues to worry about; besides, they’d probably be logging in via a different IP address).

But two-step is the next step for computer security. Alas, only for those who take advantage of the service.